Comparative Investigation of Methods of Modular Exponentiation

نویسنده

  • A. Shaikhanova
چکیده

Main parameters of evaluation of modern information protection systems that implement RSA encryption algorithm are performance, RAM consumption and stability of algorithm of used method of modular exponentiation to the attacks on implementation, particularly in the temporal analysis. Methods of modular exponentiation (binary method, method and sliding window method) are characterized by the dependence of execution time of their algorithm on the key length and by the maximum number of used memory cells. Comparative investigation of operations of binary method, method and sliding window method of modular exponentiation with "left-to-right" and "right-to-left"reading bits of exponent was conducted. Algorithm of method of modularexponentiation has high performance and reasonable consumption of RAM.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hydroponics Roofs for Saving Energy of Green Schools in the Cold and Dry climate of Iran: A Comparative Study between Two Broad and Modular Hydroponic Green Roofs

Green schools are a new type of school, in which the use of renewable energy is less than that of conventional schools. In this regard, nowadays, adding green layers to the roof of schools, in addition to increasing the Students' communication with nature, energy saving has improved in these spaces. However, to improve energy saving yield, the priority of these types of roofs in different clima...

متن کامل

High-speed Algorithms for Public-key Cryptosystems in an e-Commerce Environment

Modular exponentiation is one of the most important operations in public-key cryptosystems. A modular exponentiation is composed of repetition of modular multiplications. Again, the modular multiplication consists of a multi-precision multiplication and a modular reduction. Therefore, we can reduce the execution time of the modular exponentiation by two methods. One is to reduce the number of m...

متن کامل

Efficient Modular Exponentiation Architectures for RSA Algorithm

-Cryptosystems are used to send confidential messages in secure manner. The most important and efficient type of cryptosystem is RSA. RSA is used in various sectors such as Bank security and Internet protection. One of the various steps involved in RSA is Modular exponentiation, which is used in both Encryption and Decryption. It takes high memory and computation time of algorithm. In order to ...

متن کامل

Adaptive Modular Exponentiation Methods v.s. Python's Power Function

In this paper we use Python to implement two efficient modular exponentiation methods: the adaptive m-ary method and the adaptive sliding-window method of window size k, where both m’s are adaptively chosen based on the length of exponent. We also conduct the benchmark for both methods. Evaluation results show that compared to the industry-standard efficient implementations of modular power fun...

متن کامل

AST Pre-Processing For The Sliding Window Method Using Genetic Algorithms

Modular exponentiation is a cornerstone operation to several public-key cryptography systems such as the RSA. It is performed using successive modular multiplications. The latter is time consuming for large operands. Accelerating public-key cryptography software or hardware needs reducing the total number of modular multiplication needed. This paper introduces a novel idea based on genetic algo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015